Windows Analysis Report
17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe

Overview

General Information

Sample name: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe
Analysis ID: 1540041
MD5: 032c2903ea0d9c40a8fcb4d1c5b5df84
SHA1: ceab8cb392b4fb8185724876d0f744e5ef0303ae
SHA256: ba51abd4f461b582657dfd1f0d3fbe0e18ff178bc958ee182ca6d200dd0548e5
Tags: base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

LummaC
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
PE file contains section with special chars
Sample uses string decryption to hide its real strings
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files

Classification

Name Description Attribution Blogpost URLs Link
Lumma Stealer, LummaC2 Stealer Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.lumma

AV Detection

barindex
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe Avira: detected
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe Malware Configuration Extractor: LummaC {"C2 url": ["lariatedzugspd.shop", "shepherdlyopzc.shop", "indexterityszcoxp.shop", "callosallsaospz.shop", "handyxczos.shop", "unseaffarignsk.shop", "outpointsozp.shop", "upknittsoappz.shop", "liernessfornicsa.shop"], "Build id": "RKiJ2s--zz"}
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe ReversingLabs: Detection: 23%
Source: Submited Sample Integrated Neural Analysis Model: Matched 95.5% probability
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String decryptor: indexterityszcoxp.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String decryptor: lariatedzugspd.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String decryptor: callosallsaospz.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String decryptor: outpointsozp.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String decryptor: liernessfornicsa.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String decryptor: upknittsoappz.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String decryptor: shepherdlyopzc.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String decryptor: unseaffarignsk.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String decryptor: handyxczos.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String decryptor: lid=%s&j=%s&ver=4.0
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String decryptor: TeslaBrowser/5.5
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String decryptor: - Screen Resoluton:
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String decryptor: - Physical Installed Memory:
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String decryptor: Workgroup: -
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String decryptor: RKiJ2s--zz
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

Networking

barindex
Source: Malware configuration extractor URLs: lariatedzugspd.shop
Source: Malware configuration extractor URLs: shepherdlyopzc.shop
Source: Malware configuration extractor URLs: indexterityszcoxp.shop
Source: Malware configuration extractor URLs: callosallsaospz.shop
Source: Malware configuration extractor URLs: handyxczos.shop
Source: Malware configuration extractor URLs: unseaffarignsk.shop
Source: Malware configuration extractor URLs: outpointsozp.shop
Source: Malware configuration extractor URLs: upknittsoappz.shop
Source: Malware configuration extractor URLs: liernessfornicsa.shop

System Summary

barindex
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe Static PE information: section name: `.rdat
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe Static PE information: section name: @.data
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe Static PE information: No import functions for PE file found
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC size: 0xe8000500 address: 0x0
Source: classification engine Classification label: mal100.troj.evad.winEXE@0/0@0/0
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe ReversingLabs: Detection: 23%
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe Static PE information: real checksum: 0x4 should be: 0x55f9f
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe Static PE information: section name: `.rdat
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe Static PE information: section name: .relo
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe Static PE information: section name: @.data

HIPS / PFW / Operating System Protection Evasion

barindex
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String found in binary or memory: indexterityszcoxp.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String found in binary or memory: lariatedzugspd.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String found in binary or memory: callosallsaospz.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String found in binary or memory: outpointsozp.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String found in binary or memory: liernessfornicsa.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String found in binary or memory: upknittsoappz.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String found in binary or memory: shepherdlyopzc.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String found in binary or memory: unseaffarignsk.shop
Source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe String found in binary or memory: handyxczos.shop

Stealing of Sensitive Information

barindex
Source: Yara match File source: decrypted.binstr, type: MEMORYSTR
Source: Yara match File source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe, type: SAMPLE

Remote Access Functionality

barindex
Source: Yara match File source: decrypted.binstr, type: MEMORYSTR
Source: Yara match File source: 17296647877973b4d9dacccd509287d19eb0a4cdb4da42c6375f710743c6efc85b741dd259582.dat-decoded.exe, type: SAMPLE
No contacted IP infos